12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

122 7. WHY CYBER ESPIONAGE IS A KEY COMPONENT OF CHINESE STRATEGYThese attacks largely consisted of DoS and Web site defacement. Open source literature, suchas the previously mentioned Northrop Grumman report, indicates that the government of thePRC was not involved with these attacks—hence, they can be considered as hacktivism—asdiscussed in previous chapters. Though not directly involved, the Chinese government’s reaction<strong>to</strong> the attacks was initially encouraging—even publically lauding the efforts of thehackers. However, by 2002, this sentiment changed significantly—the PRC started <strong>to</strong> takea firm stance against freelance hacking of foreign systems. Perhaps, the watershed eventwas the PRC’s reaction <strong>to</strong> large-scale DoS against the White House. The PRC responded <strong>to</strong>this attack according <strong>to</strong> the “Honker Union of China” by labeling the assault as “Web terrorism”and “unforgivable acts of violating the law” published in the official newspaper of theCommunist Party. 18 With a few notable exceptions, such as an attempted DDoS against CNN,the activities of freelance Chinese hacker groups waned <strong>to</strong>ward the later part of the firstdecade of the twenty-first century. The PRC further looked <strong>to</strong> cement their position on suchactivities with a national antihacking law in early 2009—which was followed by a series ofhigh-profile arrests of prominent hackers (Figure 7.2).Why did the PRC seem <strong>to</strong> shift their policy on hacking groups? Perhaps, as the power ofcyber weaponry became more prevalent, the PRC sought <strong>to</strong> limit the proliferation of such capability.For instance, some military thinkers within the PLA expressed concern over membersof cyber militias improperly using hacker <strong>to</strong>ols. 19 Further, it also appears as thoughhacktivism, in general, is incompatible with INEW. There are three main aspects of this strategythat run counter <strong>to</strong> the notions of hacktivism: command and control (C2), precisionFIGURE 7.2 The front of the “Great Hall of People” in Tiananmen Square, Beijing. The Beijing government initiallylauded the efforts of independent hacker groups in the late 1990s but in the early 2000s the government’s attitudeshifted, likely as such groups were operating outside of government control. This sentiment led <strong>to</strong> theenactment of antihacking laws starting in 2009. CIA World Fact Book pho<strong>to</strong>.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!